Private Key Cryptography

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 3729 Experts worldwide ranked by ideXlab platform

Balamurugan Balusamy - One of the best experts on this subject based on the ideXlab platform.

  • an intelligent approach for uav and drone privacy security using blockchain methodology
    International Conference on Cloud Computing, 2019
    Co-Authors: Tarun Rana, Achyut Shankar, Mohd Kamran Sultan, Rizwan Patan, Balamurugan Balusamy
    Abstract:

    In today’s era drones and UAV are being used more and more for spying and warfare. Their excessive use makes them vulnerable to be hacked and used for malicious purposes. There are also security loopholes in this technology like the radio waves which can be exploited by the rivals and can cause a large amount of destruction or loss of data. This paper is written to improve the security of UAV and drones by using blockchain technology. Blockchain is a highly secured technology as it uses Private Key Cryptography and peer to peer network. By incorporating this technology in transmitting signals from controller to drone or UAV, we can achieve an extra amount of security in transmitting of signals also it increases the connectivity.

Shudhanshu Yadav - One of the best experts on this subject based on the ideXlab platform.

  • Function Codes for Protection of Key in Private Key Cryptography
    2017
    Co-Authors: Ashish Agarwal, Neha Tyagi, Anurag Katiyar, Shubham Garg, Shudhanshu Yadav
    Abstract:

    In order to check the applicability and correctness of any designed algorithm, it is must to write a code on any suitable platform that successfully implements the logic. The present work is actually an extension to what we have done in our previous works where we have tried to devise an algorithm which is based on the most popular and largely applied asymmetric Key algorithm named RSA algorithm [1]. The basic idea of latter is not touched but modified only with a piece of further enhancement in its working. The flexibility of RSA algorithm to wide range of values has instigated us to choose it for our efforts to ensure secure communication between communicating parties with the probability of getting failed minimised to great level of its implementation

Tarun Rana - One of the best experts on this subject based on the ideXlab platform.

  • an intelligent approach for uav and drone privacy security using blockchain methodology
    International Conference on Cloud Computing, 2019
    Co-Authors: Tarun Rana, Achyut Shankar, Mohd Kamran Sultan, Rizwan Patan, Balamurugan Balusamy
    Abstract:

    In today’s era drones and UAV are being used more and more for spying and warfare. Their excessive use makes them vulnerable to be hacked and used for malicious purposes. There are also security loopholes in this technology like the radio waves which can be exploited by the rivals and can cause a large amount of destruction or loss of data. This paper is written to improve the security of UAV and drones by using blockchain technology. Blockchain is a highly secured technology as it uses Private Key Cryptography and peer to peer network. By incorporating this technology in transmitting signals from controller to drone or UAV, we can achieve an extra amount of security in transmitting of signals also it increases the connectivity.

Saeed Q Y Alkhalidi - One of the best experts on this subject based on the ideXlab platform.

  • hybrid encryption decryption technique using new public Key and symmetric Key algorithm
    International Journal of Information and Computer Security, 2014
    Co-Authors: Prakash Kuppuswamy, Saeed Q Y Alkhalidi
    Abstract:

    This research study proposes hybrid encryption system using new public Key algorithm and Private Key algorithm. A hybrid cryptosystem is one which combines the convenience of a public-Key cryptosystem with the efficiency of a symmetric-Key cryptosystem. Here, we propose a provably two way secured data encryption system, which addresses the concerns of user's privacy, authentication and accuracy. This system has two different encryption algorithms which have been used both in the encryption and decryption sequence. One is public Key Cryptography based on linear block cipher another one is Private Key Cryptography based on simple symmetric algorithm. This Cryptography algorithm provides more security as well as authentication comparing to other existing hybrid algorithm.

Ashish Agarwal - One of the best experts on this subject based on the ideXlab platform.

  • Function Codes for Protection of Key in Private Key Cryptography
    2017
    Co-Authors: Ashish Agarwal, Neha Tyagi, Anurag Katiyar, Shubham Garg, Shudhanshu Yadav
    Abstract:

    In order to check the applicability and correctness of any designed algorithm, it is must to write a code on any suitable platform that successfully implements the logic. The present work is actually an extension to what we have done in our previous works where we have tried to devise an algorithm which is based on the most popular and largely applied asymmetric Key algorithm named RSA algorithm [1]. The basic idea of latter is not touched but modified only with a piece of further enhancement in its working. The flexibility of RSA algorithm to wide range of values has instigated us to choose it for our efforts to ensure secure communication between communicating parties with the probability of getting failed minimised to great level of its implementation